Linux Unified Key Setup-on-disk-format (or LUKS) allows you to encrypt partitions on your Linux computer. This is particularly important when it comes to mobile computers and removable media. LUKS allows multiple user keys to decrypt a master key which is used for the bulk encryption of the partition.

Linux Unified Key Setup-on-disk-format (or LUKS) allows you to encrypt partitions on your Linux computer. This is particularly important when it comes to mobile computers and removable media. LUKS allows multiple user keys to decrypt a master key which is used for the bulk encryption of the partition.

−

== LUKS Implementation in Fedora 9 ==

+

== LUKS Implementation in Fedora ==

−

Fedora 9 utilizes LUKS to perform file system encryption. By default, the option to encrypt the file system is checked during the installation. You are prompted for a passphrase that will be asked every time you boot the computer. This passphrase "unlocks" the bulk encryption key that is used to decrypt your partition.

+

Fedora 9, and later, utilizes LUKS to perform file system encryption. By default, the option to encrypt the file system is unchecked during the installation. If you select the option to encrypt you hard drive, you will be prompted for a passphrase that will be asked every time you boot the computer. This passphrase "unlocks" the bulk encryption key that is used to decrypt your partition.

If you choose to modify the default partition table you can choose which partitions you want to encrypt. This is set in the partition table settings.

If you choose to modify the default partition table you can choose which partitions you want to encrypt. This is set in the partition table settings.

−

== Encrypted Home Directories ==

+

Fedora 9's default implementation of LUKS is AES 128 with a SHA256 hashing. Ciphers that are available are:

{{ Template:message/notice | Following this procedure will remove all data on the partition that you are encrypting. You WILL loose all your information! Make sure you backup your data to an external source before beginning this procedure!

+

== Manually Encrypting Directories ==

−

}}

+

+

{{admon/warning | Data erasure! | Following this procedure will remove all data on the partition that you are encrypting. You WILL lose all your information! Make sure you backup your data to an external source before beginning this procedure!}}

+

+

If you are running a version of Fedora prior to Fedora 9 and want to encrypt a partition or you want to encrypt a partition after the fact in Fedora 9, or later, the following directions are for you. The below example demonstrates encrypting your <code>/home</code> partition but any partition can be used.

The following procedure will reconfigure and format your <code>/home</code>. The procedure is for single-user computers or computers that are shared between trusted users.

The following procedure will reconfigure and format your <code>/home</code>. The procedure is for single-user computers or computers that are shared between trusted users.

Line 24:

Line 33:

=== Step-by-Step Instructions ===

=== Step-by-Step Instructions ===

−

* enter runlevel 1: <code>telinit 1</code>

+

# enter runlevel 1: <code>telinit 1</code>

−

* unmount your existing ''/home'': <code>umount /home</code>

+

# unmount your existing ''/home'': <code>umount /home</code>

−

* if it fails use ''fuser'' to find and kill processes hogging ''/home'': <code>fuser -mvk /home</code>

+

# if it fails use ''fuser'' to find and kill processes hogging ''/home'': <code>fuser -mvk /home</code>

Chapter 4, Section 1 - Linux Unified Key Setup-on-disk-format (LUKS)

Introduction to LUKS

Linux Unified Key Setup-on-disk-format (or LUKS) allows you to encrypt partitions on your Linux computer. This is particularly important when it comes to mobile computers and removable media. LUKS allows multiple user keys to decrypt a master key which is used for the bulk encryption of the partition.

LUKS Implementation in Fedora

Fedora 9, and later, utilizes LUKS to perform file system encryption. By default, the option to encrypt the file system is unchecked during the installation. If you select the option to encrypt you hard drive, you will be prompted for a passphrase that will be asked every time you boot the computer. This passphrase "unlocks" the bulk encryption key that is used to decrypt your partition.

If you choose to modify the default partition table you can choose which partitions you want to encrypt. This is set in the partition table settings.

Fedora 9's default implementation of LUKS is AES 128 with a SHA256 hashing. Ciphers that are available are:

Manually Encrypting Directories

Data erasure! Following this procedure will remove all data on the partition that you are encrypting. You WILL lose all your information! Make sure you backup your data to an external source before beginning this procedure!

If you are running a version of Fedora prior to Fedora 9 and want to encrypt a partition or you want to encrypt a partition after the fact in Fedora 9, or later, the following directions are for you. The below example demonstrates encrypting your /home partition but any partition can be used.

The following procedure will reconfigure and format your /home. The procedure is for single-user computers or computers that are shared between trusted users.

The following procedure will wipe all your existing data, so be sure to have a tested backup before you start. This also requires you to have a separate partition for /home (in my case that is /dev/VG00/LV_home). All the following must be done as root. Any of these steps failing means you must not continue until the step succeeded.

Step-by-Step Instructions

enter runlevel 1: telinit 1

unmount your existing /home: umount /home

if it fails use fuser to find and kill processes hogging /home: fuser -mvk /home

This process can take some time and proceeds at the sequential write speed of your device. It's an important step to ensure no unencrypted data is left on a used device,
and to obfuscate which parts of the device contain encrypted as opposed to just random data.